Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too. 68 pp. Englisch. N° de réf. du vendeur 9786204197586
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. N° de réf. du vendeur 505012057
Quantité disponible : Plus de 20 disponibles
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 68 pp. Englisch. N° de réf. du vendeur 9786204197586
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like that someone other in between can change the content of data while confidentiality is the assurance that no one can read the original data in transmission or storage.There are many algorithms that are develop to ensure these properties but there is always a competition to develop an algorithm which is more time efficient and secure.Authors have designed an architecture which provides authentication, confidentiality and integrity in one. This architecture is designed in such a way it is not only secure but also time efficient too. N° de réf. du vendeur 9786204197586
Quantité disponible : 1 disponible(s)